An Adaptive Initial Trust and Demand Aware Secure Resource Discovery (AID-SRD) model for pervasive environments
暂无分享,去创建一个
[1] Mohammad Zulkernine,et al. Towards Secure Trust Bootstrapping in Pervasive Computing Environment , 2008, 2008 11th IEEE High Assurance Systems Engineering Symposium.
[2] Daniele Quercia,et al. TRULLO - local trust bootstrapping for ubiquitous devices , 2007, 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services (MobiQuitous).
[3] Sheikh Iqbal Ahamed,et al. A Risk-aware Trust Based Secure Resource Discovery (RTSRD) Model for Pervasive Computing , 2008, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom).
[4] Sheikh Iqbal Ahamed,et al. MARKS (Middleware Adaptability for Resource Discovery, Knowledge Usability and Self-healing) for Mobile Devices of Pervasive Computing Environments , 2006, Third International Conference on Information Technology: New Generations (ITNG'06).
[5] Frank Stajano,et al. Security for Ubiquitous Computing , 2002, ICISC.
[6] Sheikh Iqbal Ahamed,et al. SAFE-RD (secure, adaptive, fault tolerant, and efficient resource discovery) in pervasive computing environments , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.
[7] Sheikh Iqbal Ahamed,et al. An adaptive lightweight trust reliant secure resource discovery for pervasive computing environments , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM'06).
[8] David R. Karger,et al. INS/Twine: A Scalable Peer-to-Peer Architecture for Intentional Resource Discovery , 2002, Pervasive.
[9] Lionel M. Ni,et al. Splendor: A secure, private, and location-aware service discovery protocol supporting mobile services , 2003, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..
[10] Haifeng Li,et al. SSRD+: A Privacy-aware Trust and Security Model for Resource Discovery in Pervasive Computing Environment , 2006, 30th Annual International Computer Software and Applications Conference (COMPSAC'06).
[11] Mark Weiser,et al. Some computer science issues in ubiquitous computing , 1993, CACM.
[12] Mohammad Zulkernine,et al. Architecture and Implementation of a trust Model for Pervasive Applications , 2008, J. Mobile Multimedia.
[13] Mark Weiser,et al. Some Computer Science Problems in Ubiquitous Computing , 1993 .
[14] T. Nixon,et al. Home networking with Universal Plug and Play , 2001 .
[15] Frank Stajano,et al. The Resurrecting Duckling: security issues for ubiquitous computing , 2002, S&P 2002.
[16] Mahadev Satyanarayanan,et al. Fundamental challenges in mobile computing , 1996, PODC '96.
[17] Celeste Campo,et al. SPDP: A Secure Service Discovery Protocol for Ad-hoc Networks , 2003 .
[18] Lionel M. Ni,et al. PrudentExposure: a private and user-centric service discovery protocol , 2004, Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the.
[19] Michael Nidd,et al. Service discovery in DEAPspace , 2001, IEEE Wirel. Commun..
[20] Hari Balakrishnan,et al. The design and implementation of an intentional naming system , 1999, SOSP.
[21] Armando Fox,et al. System Software for Ubiquitous Computing , 2022 .
[22] Lionel M. Ni,et al. Expose or not? A progressive exposure approach for service discovery in pervasive computing environments , 2005, Third IEEE International Conference on Pervasive Computing and Communications.